The plugin does not sanitise and escape its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Put the following payload in any of the plugin's settings: "><img src onerror=prompt(/XSS/)>
Vaibhav Nitin Gaikwad
Vaibhav Nitin Gaikwad
Yes
2022-03-28 (about 4 months ago)
2022-03-28 (about 4 months ago)
2022-04-11 (about 4 months ago)